Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   39.153172] ==================================================================
[   39.167539] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   39.174395] Read of size 1 at addr ffff800089507c2a by task kunit_try_catch/296
[   39.181685] 
[   39.183173] CPU: 2 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   39.183229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.183248] Hardware name: WinLink E850-96 board (DT)
[   39.183272] Call trace:
[   39.183288]  show_stack+0x20/0x38 (C)
[   39.183325]  dump_stack_lvl+0x8c/0xd0
[   39.183363]  print_report+0x310/0x608
[   39.183400]  kasan_report+0xdc/0x128
[   39.183436]  __asan_report_load1_noabort+0x20/0x30
[   39.183476]  kasan_stack_oob+0x238/0x270
[   39.183506]  kunit_try_run_case+0x170/0x3f0
[   39.183545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.183583]  kthread+0x328/0x630
[   39.183610]  ret_from_fork+0x10/0x20
[   39.183645] 
[   39.245751] The buggy address belongs to stack of task kunit_try_catch/296
[   39.252606]  and is located at offset 138 in frame:
[   39.257465]  kasan_stack_oob+0x0/0x270
[   39.261204] 
[   39.262673] This frame has 4 objects:
[   39.266323]  [48, 49) '__assertion'
[   39.266348]  [64, 72) 'array'
[   39.269794]  [96, 112) '__assertion'
[   39.272744]  [128, 138) 'stack_array'
[   39.276301] 
[   39.281428] The buggy address belongs to the virtual mapping at
[   39.281428]  [ffff800089500000, ffff800089509000) created by:
[   39.281428]  kernel_clone+0x150/0x7a8
[   39.296701] 
[   39.298181] The buggy address belongs to the physical page:
[   39.303736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646e
[   39.311721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.318243] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.325960] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.333680] page dumped because: kasan: bad access detected
[   39.339235] 
[   39.340710] Memory state around the buggy address:
[   39.345492]  ffff800089507b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.352694]  ffff800089507b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   39.359899] >ffff800089507c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   39.367099]                                   ^
[   39.371616]  ffff800089507c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   39.378821]  ffff800089507d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.386023] ==================================================================

[   28.786393] ==================================================================
[   28.786557] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   28.786691] Read of size 1 at addr ffff800080a07c2a by task kunit_try_catch/249
[   28.786829] 
[   28.786958] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.787642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.787746] Hardware name: linux,dummy-virt (DT)
[   28.787956] Call trace:
[   28.788021]  show_stack+0x20/0x38 (C)
[   28.788533]  dump_stack_lvl+0x8c/0xd0
[   28.788686]  print_report+0x310/0x608
[   28.789054]  kasan_report+0xdc/0x128
[   28.789180]  __asan_report_load1_noabort+0x20/0x30
[   28.789308]  kasan_stack_oob+0x238/0x270
[   28.789483]  kunit_try_run_case+0x170/0x3f0
[   28.789993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.790197]  kthread+0x328/0x630
[   28.790319]  ret_from_fork+0x10/0x20
[   28.790618] 
[   28.790823] The buggy address belongs to stack of task kunit_try_catch/249
[   28.791142]  and is located at offset 138 in frame:
[   28.791237]  kasan_stack_oob+0x0/0x270
[   28.791561] 
[   28.791647] This frame has 4 objects:
[   28.791951]  [48, 49) '__assertion'
[   28.792489]  [64, 72) 'array'
[   28.792583]  [96, 112) '__assertion'
[   28.792971]  [128, 138) 'stack_array'
[   28.793204] 
[   28.793285] The buggy address belongs to the virtual mapping at
[   28.793285]  [ffff800080a00000, ffff800080a09000) created by:
[   28.793285]  kernel_clone+0x150/0x7a8
[   28.793476] 
[   28.793535] The buggy address belongs to the physical page:
[   28.793692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f6
[   28.794417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.794591] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.794998] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.795122] page dumped because: kasan: bad access detected
[   28.795225] 
[   28.795290] Memory state around the buggy address:
[   28.795642]  ffff800080a07b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.796092]  ffff800080a07b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   28.796212] >ffff800080a07c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   28.796322]                                   ^
[   28.796408]  ffff800080a07c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   28.796516]  ffff800080a07d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.796781] ==================================================================

[   28.914288] ==================================================================
[   28.915029] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   28.915220] Read of size 1 at addr ffff800080a97c2a by task kunit_try_catch/249
[   28.915567] 
[   28.915660] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.915897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.916059] Hardware name: linux,dummy-virt (DT)
[   28.916241] Call trace:
[   28.916339]  show_stack+0x20/0x38 (C)
[   28.916468]  dump_stack_lvl+0x8c/0xd0
[   28.916654]  print_report+0x310/0x608
[   28.917023]  kasan_report+0xdc/0x128
[   28.917201]  __asan_report_load1_noabort+0x20/0x30
[   28.917558]  kasan_stack_oob+0x238/0x270
[   28.917700]  kunit_try_run_case+0x170/0x3f0
[   28.917872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.918026]  kthread+0x328/0x630
[   28.919015]  ret_from_fork+0x10/0x20
[   28.919231] 
[   28.919353] The buggy address belongs to stack of task kunit_try_catch/249
[   28.919609]  and is located at offset 138 in frame:
[   28.919727]  kasan_stack_oob+0x0/0x270
[   28.920085] 
[   28.920158] This frame has 4 objects:
[   28.920377]  [48, 49) '__assertion'
[   28.920494]  [64, 72) 'array'
[   28.920580]  [96, 112) '__assertion'
[   28.920719]  [128, 138) 'stack_array'
[   28.920909] 
[   28.921003] The buggy address belongs to the virtual mapping at
[   28.921003]  [ffff800080a90000, ffff800080a99000) created by:
[   28.921003]  kernel_clone+0x150/0x7a8
[   28.921946] 
[   28.922025] The buggy address belongs to the physical page:
[   28.922326] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776f
[   28.922736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.922982] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.923248] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.923676] page dumped because: kasan: bad access detected
[   28.923979] 
[   28.924065] Memory state around the buggy address:
[   28.924155]  ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.924717]  ffff800080a97b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   28.924921] >ffff800080a97c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   28.925104]                                   ^
[   28.925161]  ffff800080a97c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   28.925220]  ffff800080a97d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.925300] ==================================================================

[   20.660917] ==================================================================
[   20.662074] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   20.663111] Read of size 1 at addr ffff88810393fd02 by task kunit_try_catch/267
[   20.663614] 
[   20.663797] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   20.663863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.664407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.664487] Call Trace:
[   20.664528]  <TASK>
[   20.664572]  dump_stack_lvl+0x73/0xb0
[   20.664661]  print_report+0xd1/0x650
[   20.664739]  ? __virt_addr_valid+0x1db/0x2d0
[   20.664820]  ? kasan_stack_oob+0x2b5/0x300
[   20.664914]  ? kasan_addr_to_slab+0x11/0xa0
[   20.664987]  ? kasan_stack_oob+0x2b5/0x300
[   20.665059]  kasan_report+0x141/0x180
[   20.665134]  ? kasan_stack_oob+0x2b5/0x300
[   20.665216]  __asan_report_load1_noabort+0x18/0x20
[   20.665296]  kasan_stack_oob+0x2b5/0x300
[   20.665367]  ? __pfx_kasan_stack_oob+0x10/0x10
[   20.665432]  ? finish_task_switch.isra.0+0x153/0x700
[   20.665502]  ? __switch_to+0x47/0xf50
[   20.665595]  ? __schedule+0x10cc/0x2b60
[   20.665677]  ? __pfx_read_tsc+0x10/0x10
[   20.665753]  ? ktime_get_ts64+0x86/0x230
[   20.665829]  kunit_try_run_case+0x1a5/0x480
[   20.665928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.666007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.666082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.666173]  ? __kthread_parkme+0x82/0x180
[   20.666206]  ? preempt_count_sub+0x50/0x80
[   20.666237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.666285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.666321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.666356]  kthread+0x337/0x6f0
[   20.666383]  ? trace_preempt_on+0x20/0xc0
[   20.666414]  ? __pfx_kthread+0x10/0x10
[   20.666443]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.666474]  ? calculate_sigpending+0x7b/0xa0
[   20.666511]  ? __pfx_kthread+0x10/0x10
[   20.666647]  ret_from_fork+0x116/0x1d0
[   20.666678]  ? __pfx_kthread+0x10/0x10
[   20.666707]  ret_from_fork_asm+0x1a/0x30
[   20.666749]  </TASK>
[   20.666763] 
[   20.689341] The buggy address belongs to stack of task kunit_try_catch/267
[   20.691006]  and is located at offset 138 in frame:
[   20.691633]  kasan_stack_oob+0x0/0x300
[   20.692174] 
[   20.692410] This frame has 4 objects:
[   20.692948]  [48, 49) '__assertion'
[   20.693028]  [64, 72) 'array'
[   20.693485]  [96, 112) '__assertion'
[   20.694685]  [128, 138) 'stack_array'
[   20.695323] 
[   20.696516] The buggy address belongs to the physical page:
[   20.697014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10393f
[   20.698267] flags: 0x200000000000000(node=0|zone=2)
[   20.698937] raw: 0200000000000000 ffffea00040e4fc8 ffffea00040e4fc8 0000000000000000
[   20.699944] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   20.700797] page dumped because: kasan: bad access detected
[   20.701228] 
[   20.702022] Memory state around the buggy address:
[   20.702742]  ffff88810393fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   20.703288]  ffff88810393fc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   20.703810] >ffff88810393fd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   20.705050]                    ^
[   20.705565]  ffff88810393fd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   20.706534]  ffff88810393fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.707274] ==================================================================

[   21.870801] ==================================================================
[   21.872294] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   21.873964] Read of size 1 at addr ffff888103b07d02 by task kunit_try_catch/267
[   21.874535] 
[   21.874869] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.875003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.875043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.875108] Call Trace:
[   21.875151]  <TASK>
[   21.875201]  dump_stack_lvl+0x73/0xb0
[   21.875296]  print_report+0xd1/0x650
[   21.875362]  ? __virt_addr_valid+0x1db/0x2d0
[   21.875432]  ? kasan_stack_oob+0x2b5/0x300
[   21.875492]  ? kasan_addr_to_slab+0x11/0xa0
[   21.875573]  ? kasan_stack_oob+0x2b5/0x300
[   21.875633]  kasan_report+0x141/0x180
[   21.875695]  ? kasan_stack_oob+0x2b5/0x300
[   21.875771]  __asan_report_load1_noabort+0x18/0x20
[   21.875854]  kasan_stack_oob+0x2b5/0x300
[   21.875929]  ? __pfx_kasan_stack_oob+0x10/0x10
[   21.875997]  ? finish_task_switch.isra.0+0x153/0x700
[   21.876073]  ? __switch_to+0x47/0xf50
[   21.876318]  ? __schedule+0x10cc/0x2b60
[   21.876389]  ? __pfx_read_tsc+0x10/0x10
[   21.876423]  ? ktime_get_ts64+0x86/0x230
[   21.876460]  kunit_try_run_case+0x1a5/0x480
[   21.876530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.876656]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.876709]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.876745]  ? __kthread_parkme+0x82/0x180
[   21.876775]  ? preempt_count_sub+0x50/0x80
[   21.876806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.876845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.876881]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.876917]  kthread+0x337/0x6f0
[   21.876947]  ? trace_preempt_on+0x20/0xc0
[   21.876985]  ? __pfx_kthread+0x10/0x10
[   21.877014]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.877047]  ? calculate_sigpending+0x7b/0xa0
[   21.877083]  ? __pfx_kthread+0x10/0x10
[   21.877113]  ret_from_fork+0x116/0x1d0
[   21.877139]  ? __pfx_kthread+0x10/0x10
[   21.877168]  ret_from_fork_asm+0x1a/0x30
[   21.877210]  </TASK>
[   21.877245] 
[   21.905190] The buggy address belongs to stack of task kunit_try_catch/267
[   21.907746]  and is located at offset 138 in frame:
[   21.909111]  kasan_stack_oob+0x0/0x300
[   21.911125] 
[   21.911367] This frame has 4 objects:
[   21.911928]  [48, 49) '__assertion'
[   21.911997]  [64, 72) 'array'
[   21.912387]  [96, 112) '__assertion'
[   21.912772]  [128, 138) 'stack_array'
[   21.913543] 
[   21.914925] The buggy address belongs to the physical page:
[   21.915745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b07
[   21.916476] flags: 0x200000000000000(node=0|zone=2)
[   21.917182] raw: 0200000000000000 ffffea00040ec1c8 ffffea00040ec1c8 0000000000000000
[   21.918698] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.920110] page dumped because: kasan: bad access detected
[   21.920623] 
[   21.920837] Memory state around the buggy address:
[   21.921271]  ffff888103b07c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   21.922059]  ffff888103b07c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   21.922687] >ffff888103b07d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   21.924010]                    ^
[   21.924380]  ffff888103b07d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   21.924834]  ffff888103b07e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.926157] ==================================================================

[   22.443964] ==================================================================
[   22.445349] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   22.446032] Read of size 1 at addr ffff8000896f7c2a by task kunit_try_catch/302
[   22.446721] 
[   22.446895] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.446958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.446977] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.446999] Call trace:
[   22.447013]  show_stack+0x20/0x38 (C)
[   22.447055]  dump_stack_lvl+0x8c/0xd0
[   22.447099]  print_report+0x310/0x608
[   22.447141]  kasan_report+0xdc/0x128
[   22.447181]  __asan_report_load1_noabort+0x20/0x30
[   22.447228]  kasan_stack_oob+0x238/0x270
[   22.447264]  kunit_try_run_case+0x170/0x3f0
[   22.447306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.447354]  kthread+0x328/0x630
[   22.447387]  ret_from_fork+0x10/0x20
[   22.447428] 
[   22.453024] The buggy address belongs to stack of task kunit_try_catch/302
[   22.453670]  and is located at offset 138 in frame:
[   22.454130]  kasan_stack_oob+0x0/0x270
[   22.454511] 
[   22.454671] This frame has 4 objects:
[   22.455029]  [48, 49) '__assertion'
[   22.455057]  [64, 72) 'array'
[   22.455400]  [96, 112) '__assertion'
[   22.455700]  [128, 138) 'stack_array'
[   22.456050] 
[   22.456548] The buggy address belongs to the virtual mapping at
[   22.456548]  [ffff8000896f0000, ffff8000896f9000) created by:
[   22.456548]  kernel_clone+0x150/0x7a8
[   22.457957] 
[   22.458120] The buggy address belongs to the physical page:
[   22.458643] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf1d6
[   22.459380] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.460017] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.460744] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.461462] page dumped because: kasan: bad access detected
[   22.461985] 
[   22.462143] Memory state around the buggy address:
[   22.462602]  ffff8000896f7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.463279]  ffff8000896f7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   22.463956] >ffff8000896f7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   22.464628]                                   ^
[   22.465065]  ffff8000896f7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   22.465741]  ffff8000896f7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   22.466413] ==================================================================